<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://k5wiki.test.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=Release_Meeting_Minutes%2F2012-04-17</id>
		<title>Release Meeting Minutes/2012-04-17 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://k5wiki.test.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=Release_Meeting_Minutes%2F2012-04-17"/>
		<link rel="alternate" type="text/html" href="https://k5wiki.test.kerberos.org/wiki?title=Release_Meeting_Minutes/2012-04-17&amp;action=history"/>
		<updated>2026-05-14T17:25:42Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://k5wiki.test.kerberos.org/wiki?title=Release_Meeting_Minutes/2012-04-17&amp;diff=4594&amp;oldid=prev</id>
		<title>TomYu: New page: {{minutes|2012}} Will Fiveash, Greg Hudson, Simo Sorce, Zhanna Tsitkov, Tom Yu  == Encrypted timestamp preauth ==  ;Will: granularity of error handling on init_creds. Invalid password diff...</title>
		<link rel="alternate" type="text/html" href="https://k5wiki.test.kerberos.org/wiki?title=Release_Meeting_Minutes/2012-04-17&amp;diff=4594&amp;oldid=prev"/>
				<updated>2012-04-17T20:14:15Z</updated>
		
		<summary type="html">&lt;p&gt;New page: {{minutes|2012}} Will Fiveash, Greg Hudson, Simo Sorce, Zhanna Tsitkov, Tom Yu  == Encrypted timestamp preauth ==  ;Will: granularity of error handling on init_creds. Invalid password diff...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{minutes|2012}}&lt;br /&gt;
Will Fiveash, Greg Hudson, Simo Sorce, Zhanna Tsitkov, Tom Yu&lt;br /&gt;
&lt;br /&gt;
== Encrypted timestamp preauth ==&lt;br /&gt;
&lt;br /&gt;
;Will: granularity of error handling on init_creds. Invalid password different from principal not found. Is reasonable to treat differently in terms of fallback? Maybe clients should know about KDC policies.&lt;br /&gt;
&lt;br /&gt;
;Greg: n-strikes -- strikes are not against the person, but the account object. Purpose is to mitigate attacks. Some suggestions about tracking password failures by source IP address; that's not necessarily helpful due to spoofing, NATs, etc.&lt;br /&gt;
&lt;br /&gt;
;Will: Errors from propagation delays -- either password changes or principal creation.&lt;br /&gt;
&lt;br /&gt;
;Simo: Lockout counts are not replicated in AD.&lt;br /&gt;
&lt;br /&gt;
;Greg: There's currently no protection against trying a KDC twice (1.3.1 master KDC behavior changes).&lt;br /&gt;
&lt;br /&gt;
;Simo: Maybe they didn't know about lockout count independence. Or maybe pass info about which KDCs have been tried.&lt;br /&gt;
&lt;br /&gt;
;Greg: Might want to track which KDCs you've talked to for other reasons, e.g. SAM preauth (causes KDC to create some state). Currently not enough state passed around; would need code rearrangement. On the bright side, sendto_kdc is a private interface, so we can change it more easily.&lt;br /&gt;
&lt;br /&gt;
;WIll: Bug we introduced -- non-PKINIT preauth. Ended up sending encrypted timestamp preauth in first AS-REQ. If principal doesn't have a key for that enctype... Solaris was using aes256; principal didn't have AES key. KDC said preauth failed. Asked Microsoft whether it would be a strike (against password failure lockout); he said no. MIT gives preauth failed.&lt;br /&gt;
&lt;br /&gt;
;Greg: Encrypted timestamp doesn't distinguish between wrong key and no key.&lt;br /&gt;
&lt;br /&gt;
;Will: optimistic preauth&lt;br /&gt;
&lt;br /&gt;
;Greg: So you don't want a &amp;quot;strike&amp;quot; in that case. Preauth failed ... Sam wanted to try different mechs. Retry once...&lt;br /&gt;
&lt;br /&gt;
;Will: Additional data?&lt;br /&gt;
&lt;br /&gt;
;Greg: Can define e-data. Encrypted timestamp doesn't.&lt;br /&gt;
&lt;br /&gt;
;Tom: AD might send some non-standard errors.&lt;br /&gt;
&lt;br /&gt;
;Will: Forwarded some messages to you. ETYPE_NOSUPP...&lt;br /&gt;
&lt;br /&gt;
== GSS extensions ==&lt;br /&gt;
&lt;br /&gt;
;Simo: Nico sent message to kitten ... 2 weeks ago. Simon mostly in favor. No objections.&lt;br /&gt;
&lt;br /&gt;
;Greg: Didn't see any serious objections. People wanted to make sure the exported form contained a reference to a store, not the actual creds. Project proposal, for documentation purposes at least. Github fork probably best way to contribute for now.&lt;br /&gt;
&lt;br /&gt;
;Simo: Attributions wrong...&lt;br /&gt;
&lt;br /&gt;
;Greg: Will manually attribute in commit; we'll work out policy for how to handle it for when we have done the git cutover.&lt;br /&gt;
&lt;br /&gt;
;Simo: Will clean up and let you know.&lt;br /&gt;
&lt;br /&gt;
;Simo: Export/import cred more important than partial sec context export.&lt;br /&gt;
&lt;br /&gt;
== IRC logging ==&lt;br /&gt;
&lt;br /&gt;
;Tom: We're losing lopbot, so possibly no logging of #krbdev soon. Might get a minimal replacement for logging. Do people care about haps in logging?&lt;br /&gt;
&lt;br /&gt;
;Will: Would be nice to have logs.&lt;br /&gt;
&lt;br /&gt;
== Release planning ==&lt;br /&gt;
&lt;br /&gt;
;Will: Verify init creds -- pick based on keytab contents. Try all host/* principals. Will submit patch via git.&lt;/div&gt;</summary>
		<author><name>TomYu</name></author>	</entry>

	</feed>